top of page
perceptive_background_267k.jpg

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.0.13, Flowise exposes an HTTP Node in AgentFlow and Chatflow…

Published:

9 maart 2026 om 23:00:00

Alert date:

10 maart 2026 om 23:02:27

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Emerging Technologies

Flowise, a drag & drop UI for building customized large language model flows, contains a Server-Side Request Forgery (SSRF) vulnerability in versions prior to 3.0.13. The vulnerability exists in the HTTP Node component of AgentFlow and Chatflow features, which performs server-side HTTP requests using user-controlled URLs without proper validation. Attackers can exploit this to force the Flowise server to make requests to internal network resources including private IP ranges (RFC 1918), localhost, and cloud metadata endpoints. This allows unauthorized access to internal systems that are not accessible from the public internet. The vulnerability has been patched in version 3.0.13.

Technical details

Mitigation steps:

Affected products:

Flowise

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page